1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Galina-37 [17]
3 years ago
8

Imagine Frankie has a computer with a full hard drive. She needs to create and save a new document, so she deletes a bunch of ol

d files, then writes and saves the document. Describe how the OS interacts with the disk to allow the new file to be written.
Computers and Technology
1 answer:
SashulF [63]3 years ago
7 0

Answer:

Explanation:

In a situation like this, the OS erases the files from its core, and saves the document in its files compartment

You might be interested in
Which of the following statement is correct ? A . potential difference is measured by ammeter . B . The unit of potential differ
lina2011 [118]

Answer:

C.Battery is a source of potential difference in a circuit.

Explanation:

A battery is a source of electrons and positive ions which sets one of it's terminal (cathode) at negative potential and the other (anode) at positive potential. Hence a battery is a source of electricity(electrons) which sets a potential difference across the battery terminals.

4 0
3 years ago
What is output if the user types in 8
Lady_Fox [76]

Answer: 8

And if you hold shift while typing it, it gives *

7 0
3 years ago
What must your motherboard have to use bitlocker encryption in windows 7 which will ensure that your hard drive cannot be used i
Gala2k [10]

your motherboard must have TPM Chip to use bitlocker encryption in windows 7 which will ensure that your hard drive cannot be used in another computer.

<h3 /><h3>What is a motherboard?</h3>
  • The primary printed circuit board (PCB) of all-purpose computers and other extensible systems is called a motherboard.
  • The primary printed circuit board (PCB) of a computer is called the motherboard. All components and external peripherals connect to a computer's motherboard, which serves as its main communications hub.
  • It offers connections for various peripherals and retains and enables communication between many of the critical electrical parts of a system, including the memory and central processor unit (CPU).
  • In contrast to a backplane, a motherboard frequently houses important sub-systems such the central CPU, input/output and memory controllers for the chipset, interface connections, and other parts that are integrated for general usage.
  • Specifically, a PCB with expansion capability is referred to as a motherboard.

To learn more about motherboard, refer to the following link:

brainly.com/question/15058737

#SPJ4

6 0
2 years ago
3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All
ELEN [110]

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

7 0
3 years ago
I’m nobody. Who are you?
stepan [7]

Answer:

The poet praises the common man.

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • A company wants to build a webpage that displays KPIs that can be derived from values in datasets stored in Einstein Analytics.
    6·1 answer
  • Google Apps are an example of​ ________. A. platform as a service​ (PaaS) B. software as a product​ (SaaP) C. platform as a prod
    7·1 answer
  • What kinds of online behaviors could be considered cyberbullying?
    7·2 answers
  • We have two processors. They are named PL and PS. PL has a large number of registers, and PS has a small number of registers. Th
    7·1 answer
  • The text discusses three different steps when processing input. Which of the following is (are) one of those steps? (Check all t
    8·1 answer
  • websites in which a question appears at the top with boxes underneath that help answer the question are called?
    10·1 answer
  • You need to synchronize your mobile device data with your desktop computer. for security reasons, your organization prohibits sy
    5·1 answer
  • Q: If a program is invoked with "python program.py -r input.dat output.dat", what are the elements of argv?
    10·1 answer
  • What is the term for a media piece that is ineligible for protection by copyright laws,
    15·1 answer
  • OSI layer for HDLC??​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!